Collection of selected papers of the III International Conference on Information Technology and Nanotechnology最新文献

筛选
英文 中文
SoC opportunities for boosting SDR GNSS performance 提升SDR GNSS性能的SoC机会
A. Kumarin, I. Kudryavtsev
{"title":"SoC opportunities for boosting SDR GNSS performance","authors":"A. Kumarin, I. Kudryavtsev","doi":"10.18287/1613-0073-2019-2416-457-462","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-457-462","url":null,"abstract":"Software-defined-radio (SDR) becomes an attractive technique for the development of GNSS receivers due to universal hardware and high flexibility. However, the performance of signal processing can be a challenging task. Real-time mode implementation requires fast floating point calculations in several threads, not available for most part of embedded systems. This paper describes the system-on-chip based device drastically increasing computational performance. A summary of computational complexity of each stage of GNSS receiver is provided and several particular solutions are proposed.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73357104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forecast of water-cut at wells under design by machine learning methods 利用机器学习方法预测设计井含水率
M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin
{"title":"Forecast of water-cut at wells under design by machine learning methods","authors":"M. Enikeev, M. F. Fazlytdinov, L. Enikeeva, I. Gubaidullin","doi":"10.18287/1613-0073-2019-2416-510-520","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-510-520","url":null,"abstract":"A large amount of data is generated during the operation of oil fields. Such data can be both data already interpreted by a specialist, or \"raw” data obtained directly from the devices, both structured and not structured, or locally structured (that is, allowing for local analysis, but in such form not allowing analyzing in conjunction with other types of data). To obtain from such a set of more informative data that will allow making decisions in the course of field operation, it is necessary to involve specialists from different areas of the oil industry. Therefore, it is possible and necessary to use non-deterministic methods for analyzing the data obtained. The article discusses the use of machine learning methods in the task of determining the initial water-cut based on well logging data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78671682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applying doubly stochastic filters to evaluate the dynamics of object sizes on satellite image sequences 应用双随机滤波器评估卫星图像序列中目标尺寸的动态变化
V. Dementyev, D. Kondratyev
{"title":"Applying doubly stochastic filters to evaluate the dynamics of object sizes on satellite image sequences","authors":"V. Dementyev, D. Kondratyev","doi":"10.18287/1613-0073-2019-2391-54-59","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-54-59","url":null,"abstract":"One of the important tasks facing the regional authorities is to monitor the condition of roads and power lines. In the Ulyanovsk region more than 8 thousand km of power lines and more than 9 thousand km of roads (including rural). A significant part of these facilities is located outside the settlements in places with medium and low availability. In many such places there is a problem of uncontrolled forest overgrowth. This work is devoted to solving the problem of automated satellite monitoring of such areas. For this purpose, it is proposed to use a modified convolutional neural network that processes time sequences of multispectral satellite images and allows to allocate territories occupied by forest and undergrowth with high accuracy. This approach allows us to assess the dynamics of overgrowth of the territory and perform the appropriate forecast with sufficient accuracy for practice.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78551433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double stochastic wave models of multidimensional random fields 多维随机场的双随机波模型
V. Krasheninnikov, A. Subbotin
{"title":"Double stochastic wave models of multidimensional random fields","authors":"V. Krasheninnikov, A. Subbotin","doi":"10.18287/1613-0073-2019-2391-41-47","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-41-47","url":null,"abstract":"The paper deals with the development of mathematical models of random fields to describe and simulate images. In the wave model, a random field is the result of the influence of perturbations (waves) that occur at random times in random places and have random shapes. This model allows representing and simulate isotropic and anisotropic images (and their temporal sequences) defined on arbitrary areas of multidimensional space, as well as on any surfaces. The problems of correlation analysis and synthesis can be relatively easily solved. However, this model allows representing only homogeneous fields. In this paper, we consider «double stochastic» wave models, when the first wave random field (control field) sets the parameters of the second (controlled field). As a result, the controlled field becomes nonuniform, since its parameters vary randomly. We also consider options when two fields mutually influence each other. These models allow us to represent and simulate multidimensional inhomogeneous images (and their temporal sequences), as well as systems of such images with mutual correlations.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82102451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining the proximity of groups in social networks based on text analysis using big data 基于使用大数据的文本分析来确定社交网络中群体的接近度
A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh
{"title":"Determining the proximity of groups in social networks based on text analysis using big data","authors":"A. Mukhin, I. Rytsarev, R. Paringer, A. Kupriyanov, D. Kirsh","doi":"10.18287/1613-0073-2019-2416-521-526","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-521-526","url":null,"abstract":"The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82339525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The implementation of ”Kuznyechik” encryption algorithm using NVIDIA CUDA technology 采用NVIDIA CUDA技术实现“Kuznyechik”加密算法
A. Borisov, E. Myasnikov
{"title":"The implementation of ”Kuznyechik” encryption algorithm using NVIDIA CUDA technology","authors":"A. Borisov, E. Myasnikov","doi":"10.18287/1613-0073-2019-2416-308-313","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-308-313","url":null,"abstract":"In this paper, we discuss various options for implementing the ”Kuznyechik” block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90483839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forecasting using predictor selection from a large set of highly correlated variables 从大量高度相关的变量中选择预测器进行预测
A. Timofeeva, Y. Mezentsev
{"title":"Forecasting using predictor selection from a large set of highly correlated variables","authors":"A. Timofeeva, Y. Mezentsev","doi":"10.18287/1613-0073-2019-2416-10-18","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-10-18","url":null,"abstract":"The potential of correlation-based feature selection has been explored in selecting an optimal subset from a set of highly correlated predictors. This problem occurs, for example, in time series forecasting of economic indicators using regression models on multiple lags of a large number of candidate leading indicators. Greedy algorithms (forward selection and backward elimination) in such cases fail. To obtain the globally optimal solution, the feature selection problem is formulated as a mixed integer programming problem. To solve it, we use the binary cut-and-branch method. The results of simulation studies demonstrate the advantage of using the binary cut-and-branch method in comparison with heuristic search algorithms. The real example of the selection of leading indicators of consumer price index growth shows the acceptability of using the correlation-based feature selection method.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90634253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of vision systems to improve the effectiveness of monitoring compliance with technical safety requirements at industrial facilities 应用视觉系统,提高监察工业设施是否符合技术安全规定的效率
A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov
{"title":"Application of vision systems to improve the effectiveness of monitoring compliance with technical safety requirements at industrial facilities","authors":"A. A. Ekimenko, E. A. Ekimenko, Sergey V. Shavetov","doi":"10.18287/1613-0073-2019-2391-318-325","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2391-318-325","url":null,"abstract":"According to the Federal State Statistics Service for 2017, over 25,000 injuries at work were registered in Russia, of which 1,138 were fatal. Studies have shown that most of the injuries in the workplace due to non-compliance with technical safety rules, namely the lack of personal protective equipment or their improper use. To improve the efficiency of monitoring compliance with the rules of technical safety at industrial facilities, this paper discusses the use of vision systems for automatic control of the availability of personal protective equipment at workers in the area of industrial work.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection system on the basis of data mining algorithms in the industrial network 基于数据挖掘算法的入侵检测系统在工业网络中的应用
M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov
{"title":"Intrusion detection system on the basis of data mining algorithms in the industrial network","authors":"M. A. Gurin, A. M. Vulfin, V. Vasilyev, A. Nikonov","doi":"10.18287/1613-0073-2019-2416-553-565","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-553-565","url":null,"abstract":"The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90149794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of spam using email signatures 使用电子邮件签名检测垃圾邮件
E. Sharapova, R. Sharapov
{"title":"Detection of spam using email signatures","authors":"E. Sharapova, R. Sharapov","doi":"10.18287/1613-0073-2019-2416-165-172","DOIUrl":"https://doi.org/10.18287/1613-0073-2019-2416-165-172","url":null,"abstract":"Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.","PeriodicalId":10486,"journal":{"name":"Collection of selected papers of the III International Conference on Information Technology and Nanotechnology","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88378566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信